Skip to main content
Log in

A Non-repudiated Self-service Store System Based on Portable Trusted Device

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. However, the current mobile transactions are not provided with the non-repudiated characteristics. In this paper, we propose a novel scheme in self-service store. We involve an “observer” to coordinate the transaction to overcome the computing resource weakness of the PTD. This research integrates some cryptology such as public key infrastructure, hashing chain and digital signature and so on. The proposed protocol meets the self-service store requirements such that fairness, non-repudiation, anonymity, efficient verification, simplicity and practicability issues can be guaranteed. On the basis of the PTD is more portable and personal than personal computer, it will be expected the more widely use in PTD applications. Our scheme will facilitate the mobile commerce prosperously, and will bring more commerce profits and more convenient to mobile user in our daily life.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Asokan, N., Schunter, M., & Waidner, M. (1997). Optimistic protocols for fair exchange. In Proceedings 4th ACM Conference Computer Communication Security (pp. 6–17).

  2. Asokan, N., Shoup, V., & Waidner, M. (1998). Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy (pp. 86–99).

  3. Asokan N., Shoup V., Waidner M. (2000) Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications 18(4): 593–610. doi:10.1109/49.839935

    Article  Google Scholar 

  4. Buttyan, L., & Hubaux, J. P. (1999). Accountable anonymous access to services in mobile communication systems. In Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems(SRDS’99) (pp. 384–389) Workshop on Electronic Commerce.

  5. Chen Y.Y., Chen C.L., Jan J.K. (2007) A mobile ticket system based on personal trusted device. Wireless Personal Communications 40(4): 569–578. doi:10.1007/s11277-006-9122-x

    Article  Google Scholar 

  6. Chen Y.Y., Jan J.K., Chen C.L. (2005) A fair and secure mobile billing system. Computer Networks 48(4): 517–524. doi:10.1016/j.comnet.2004.10.011

    Article  Google Scholar 

  7. Chen, C. L., Lin, H. Y., Chen, Y. Y., & Jan, J. K. (2006). A Fair Transaction Model in Mobile Commerce. In The 6th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2006) (pp. 484–489). Vancouver, Canada, Aug. 27–30.

  8. Coffey T., Saidha P. (1996) Non-repudiation with mandatory proof receipt. ACM SIGCOMM Computer Communication Review 26(1): 6–17. doi:10.1145/232335.232338

    Article  Google Scholar 

  9. Cox, B., Tygar, J. D., & Sirbu, M. (1995). NetBill security and transaction protocol. In Proceedings of the First USENIX Workshop on Electronic Commerce(pp. 77–88).

  10. Fujimura, K., & Nakajima, Y. (1998). General-purpose digital ticket framework. In 3rd USENIX Workshop on Electronic Commerce (pp.177–186). Boston, Massachusetts, August 31–September 3.

  11. Grosche S.S., Knospe H. (2002) Secure mobile commerce. Electronics & Communication Engineering Journal 14(5): 228–238. doi:10.1049/ecej:20020506

    Article  Google Scholar 

  12. Kremer S., Markowitch O., Zhou J. (2002) An intensive survey of fair non-repudiation protocols. Computer Communications 25: 1606–1607. doi:10.1016/S0140-3664(02)00049-X

    Article  Google Scholar 

  13. Liew, C. C., Ng, W. K., Lim, E. P., Tan, B. S., & Ong, K. L.(1999), Non-repudiation in an agent-based electronic commerce system. In Proceedings of Database and Expert Systems Applications (pp. 864–868).

  14. Mana, A., Martinez, J., Matamoros, S., & Troya, J. M. (2001). GSM-ticket: Generic secure mobile ticket service. In GEMPLUS Developer Conference(pp. 1–7), Paris, France.

  15. MeT Ticketing Requirements. MeT Version 1.0. http://www.openmobilealliance.org/.

  16. MeT Ticketing Framework Discussion Document. (2001). Mobile electronic. Transactions, 21. http://www.mobiletransaction.org/pdf/R11/MeT-Ticketing-Framework-R11.pdf..

  17. MobileIN company. http://www.mobilein.com/ussd.htm. Accessed February 2007.

  18. Patel, B., & Crowcroft, J. (1997). Ticket based service access for the mobile user. In Proceedings of the Third Annual ACM/IEEE International Conference on Mobile Computing and Networking (pp. 223–233), Budapest, Hungary.

  19. Rabin M.O. (1983) Transaction protection by beacons. Journal of Computer and System Sciences 27(2): 256–267. doi:10.1016/0022-0000(83)90042-9

    Article  MATH  MathSciNet  Google Scholar 

  20. Tsalgatidou A., Pitoura E. (2001) Business models and transactions in mobile electronic commerce: Requirements and properties. Computer Networks 37(2): 221–236. doi:10.1016/S1389-1286(01)00216-X

    Article  Google Scholar 

  21. Tsalgatidou, A., Veijalainen, J., Pitoura, E. (2000). Challenge in mobile electronic commerce. In Proceeding of IeC 2000, 3rd International Conference on Innovation through E-Commerce. UK, November 14th–16th.

  22. Veijalainen J., Terziyan V., Tirri H. (2006) Transaction management for M-commerce at a mobile terminal. Electronic Commerce Research and Applications 5(3): 229–245. doi:10.1016/j.elerap.2005.10.010

    Article  Google Scholar 

  23. Wang, H., Cao, J., & Zhang, Y. (2002), Ticket-based service scheme for mobile users. In The 25th Australian Computer Science Conference (ACSC2002), Melbourne, Australia. Conference in Research and Practice in Information Technology.

  24. Wagner, D., & Schneier, B. (1996). Analysis of the SSL 3.0 protocol. In Proceedings of the Second USENIX Workshop on Electronic Commerce (pp. 29–40). USSENIX Press.

  25. Wireless Transport Layer Security Specification. WAP-261-WTLS-20010406-a. URL: http://www.openmobilealliance.org/tech/affiliates/wap/wapindex.html. Accessed August 2007.

  26. Zhang N., Shi Q. (1996) Achieving non-repudiation of receipt. The Computer Journal 39(10): 844–853. doi:10.1093/comjnl/39.10.844

    Article  Google Scholar 

  27. Zhou, J., & Gollmann, D. (1996). A fair non-repudiation protocol. In Proceedings of 1996 IEEE Symposium on Security and Privacy (pp. 55–61), Oakland, California.

  28. Zhou J., Gollmann D. (1997) Evidence and non-repudiation. Journal of Network and Computer Applications 20: 267–281. doi:10.1006/jnca.1997.0056

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Ling Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, CL., Chen, YY. A Non-repudiated Self-service Store System Based on Portable Trusted Device. Wireless Pers Commun 49, 475–485 (2009). https://doi.org/10.1007/s11277-008-9568-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-008-9568-0

Keywords

Navigation